Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
20912 open access dissertations and theses found for:
if(Security maturity)  »   Refine Search
241.
Continuity and Change: Structural Realism and International Stability in the Information Age
by Mitsutomi, Yuichiro, M.A.  The George Washington University. 2011: 105 pages; 1502439.
242.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
243.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
244.
Information security: A study of decision-making factors
by Griffith, Ronald E., II, Ph.D.  Capella University. 2009: 104 pages; 3342228.
245.
Mitigating Privilege Escalation
by Brookes, Scott, Ph.D.  Dartmouth College. 2018: 215 pages; 10822683.
246.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
247.
National security and transparency: The legal frameworks and factors federal courts use to balance competing democratic values
by Silver, Derigan A., Ph.D.  The University of North Carolina at Chapel Hill. 2009: 323 pages; 3352712.
248.
An analysis of the concept criticality in adult education
by Raiskums, Bernadine W., Ph.D.  Capella University. 2008: 184 pages; 3324824.
249.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
250.
Three essays on investments and time series econometrics
by Brooks, Joshua Andrew, Ph.D.  The University of Alabama. 2015: 143 pages; 3711188.
254.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
255.
Spiritual development differences between online and on campus college students
by Comeaux, Russell Mark, Ed.D.  California State University, Fullerton. 2013: 174 pages; 3570188.
257.
Coming to Terms: Career Development Experiences of NCAA Division I Female Student-Athletes in Transition
by Henderson, Markesha McWilliams, Ed.D.  The George Washington University. 2013: 153 pages; 3557564.
258.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
260.
The Eden Paradox: Humanity's simultaneous desire for and rejection of earthly paradise
by Marshall, Nancy, Ph.D.  Pacifica Graduate Institute. 2015: 280 pages; 3721281.
262.
No longer nepios: The maturation of Telemachos in Homer's "Odyssey"
by Smith, William, M.A.  Tufts University. 2010: 84 pages; 1476124.
263.
Lending relationships and liquidity insurance value of bank credit lines: Evidence from loan spreads
by Maksimenko, Tatiana, Ph.D.  City University of New York. 2013: 145 pages; 3601933.
265.
The Process of Foreseeing: A Case Study of National Security Strategy Development
by Morgan, Brian, Ed.D.  The George Washington University. 2016: 213 pages; 3733631.
266.
Examining the relationship between organization systems and information security awareness
by Tintamusik, Yanarong, D.B.A.  Northcentral University. 2010: 183 pages; 3411167.
267.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
268.
Expanding the Role of Second Harmonic Generation in Molecular and Regenerative Cardiology
by Awasthi, Samir, Ph.D.  University of California, Davis. 2013: 128 pages; 3596848.
269.
The Role of Relationship Building in a United States National Security Strategy for the Asia Pacific
by Paz y Mino, Jonathan D., M.A.  The American University of Paris (France). 2013: 66 pages; 10305828.
241 - 270 of 20912 displayed.
« First < Previous |   6    7    8    9    10    11    12    13    14    15    16   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest